Remote Threat Intelligence Analyst

Logo of Cybereason

Cybereason

πŸ“Remote - Japan

Job highlights

Summary

Join us today and help us end cyber attacks from the endpoint to everywhere! As a Cybereason Cyber Threat Intelligence Analyst, you will be instrumental in the detection and analysis of potential cyber threats, evaluating their risk level, developing comprehensive analytical reports for a variety of audiences, and improving the delivery of security services across the entire scope of our company.

Requirements

  • 4+ years of relevant experience in the cybersecurity industry, particularly in the areas of Threat Intelligence, Incident Response, Endpoint Security, Forensics, or Penetration Testing
  • Foundational understanding of computer networking and modern computer architecture/operating systems
  • Familiarity with common Cyber Threat Intelligence tools (MISP, OpenCTI, Shodan, VirusTotal, GreyNoise, etc.) and sharing protocols (i.e. STIX, TLP)
  • Working knowledge MITRE ATT&CK, Lockheed Martin’s Cyber Kill Chain, Diamond Model analysis, VERIS framework, and CVSS required
  • Background and experience in at least 3 of 6 areas is required: Cyber Threat Intelligence - OSINT, Dark Web, or research Digital Forensics & Incident Response (DFIR) Detection Engineering (in support of EDR/XDR/MDR platforms) SOC operations and analysis Malware analysis & reverse engineering Penetration Testing and/or Red Team
  • Proven ability to conduct detailed analytical reports and presentations
  • Demonstrable problem-solving and analytical thinking capabilities
  • Strong presentation and interpersonal communication skills
  • Ability to manage competing priorities and work efficiently under pressure

Responsibilities

  • Perform Cyber Threat Intelligence collection and analysis to support requests for information and generation of intelligence information for specific threat intelligence products at the tactical, operational, and strategic level
  • Execute strategic and tactical operations focused on developing, applying, and communicating a deep understanding of cyber threat actors, campaigns and nation-state-level threats
  • Identify and correlate technical indicators of compromise to enhance detection engineering and incident response
  • Produce written and verbal threat intelligence products and communications for delivery to and action by multiple stakeholders to support customer strategic decision-making
  • Provide security and threat intelligence thought leadership to stakeholders
  • Collaborate with Global SOC and IR teams during investigations and mitigation efforts by providing timely intelligence before and during critical incidents
  • Rapidly learn and adapt to new security technologies and threats
  • Perform open source intelligence (OSINT) collection and analysis, identifying relevant indications of cyber threats, malicious code, malicious websites, and vulnerabilities
  • Participate in creating and executing projects to continuously improve Cybereason Threat Intelligence sources, tools, processes, and deliverables
  • Develop and document processes, workflows, and automation that leverage the Cybereason Technical Stack to identify and assess potential threats
  • Provide security and threat intelligence mentoring to other teammates
  • Work with third parties to develop shared intelligence

Benefits

Remote work

Share this job:

Disclaimer: Please check that the job is real before you apply. Applying might take you to another website that we don't own. Please be aware that any actions taken during the application process are solely your responsibility, and we bear no responsibility for any outcomes.
Please let Cybereason know you found this job on JobsCollider. Thanks! πŸ™